207,293 research outputs found

    A descriptive review and classification of organizational information security awareness research

    Get PDF
    Information security awareness (ISA) is a vital component of information security in organizations. The purpose of this research is to descriptively review and classify the current body of knowledge on ISA. A sample of 59 peer-reviewed academic journal articles, which were published over the last decade from 2008 to 2018, were analyzed. Articles were classified using coding techniques from the grounded theory literature-review method. The results show that ISA research is evolving with behavioral research studies still being explored. Quantitative empirical research is the dominant methodology and the top three theories used are general deterrence theory, theory of planned behavior, and protection motivation theory. Future research could focus on qualitative approaches to provide greater depth of ISA understanding

    Strategic Review of Tropical Fisheries Management

    Get PDF
    This project addresses the constraints to tropical fisheries development with sustainable exploitation through a strategic assessment of tropical fisheries management with the following purposes: (1) To evaluate relevant research methods for the development of assessment models appropriate to the circumstances of tropical coastal fisheries; and (2) To evaluate the utility of existing strategies for the implementation of management advice. The report consists of three substantive chapters. Chapter 2 contains a detailed socio-economic assessment of various instruments and implementation strategies applicable to tropical capture fisheries. In Chapter 3, a detailed assessment of the fisheries for tropical large marine ecosystems has been conducted using a technique developed by FAO (Granger & Garcia 1996). The data used were the FAO statistics published regularly by FAO. This analysis has been conducted for each of the tropical large marine ecosystems and indicates that there is the potential for increased fishing in a number of these ecosystems. One of the clear requirements identified in Chapter 2 and implicit in Chapter 3, is that there is a significant need for simple and robust fisheries assessment methods which can estimate the potential of a particular resource, its capacity in terms of the level of fishing effort and its current status ie whether it is currently exploited sustainably or not. In Chapter 4, these problems are addressed directly and, using two approaches, significant simplification of fishery methods is developed. In the first approach, simple empirical relationships between the life history parameters of a species are used to develop models of potential yield which can be determined by a simple assessment of fish growth. In the second approach, optimal life history theory is applied to the key demographic parameters of exploited fish populations and using estimates of the Beverton & Holt invariants a significant simplifying of the basic stock assessment equations is developed

    Can\u27t You Smell That Smell? Clean Air Act Fixes for Factory Farm Air Pollution

    Get PDF
    Massive facilities that keep large numbers of livestock have overtaken small, independent farms as the primary source of meat, eggs, and dairy in the United States. These concentrated animal feeding operations ( CAFOs) compare more to industrial manufacturing operations than to traditional farms, and emit huge quantities of air pollutants that are harmful to public health, sickening people and damaging the environment. The Environmental Protection Agency ( EPA ) possesses statutorily provided tools under the Clean Air Act that it uses to regular other polluting industries. However, this article - after reviewing the rise of CAFOs, examining the threats they pose, and surveying current regulation - suggests that the EPA\u27s approach to CAFOs is grossly inadequate. The article argues that the agency, under the Clean Air Act, should regulate the emissions of hydrogen sulfide and ammonia, two pollutants for which factory farms are major sources. This approach is incomplete, however. Pollutant-based regulation is both overbroad in that it will regulate other sources of these pollutants and underbroad because CAFO air pollution includes more than just these pollutants. The EPA should therefore additionally or alternatively rely on a more thorough and flexible pollution source-specific tool, the New Source Performance Standards ( NSPS ). NSPS are analogous to the rigorous source-specific approach used to regulate CAFO water pollution under the Clean Water Act, and will provide a comprehensive antidote to the ills of modern, industrial animal agriculture

    Architecture-based Qualitative Risk Analysis for Availability of IT Infrastructures

    Get PDF
    An IT risk assessment must deliver the best possible quality of results in a time-effective way. Organisations are used to customise the general-purpose standard risk assessment methods in a way that can satisfy their requirements. In this paper we present the QualTD Model and method, which is meant to be employed together with standard risk assessment methods for the qualitative assessment of availability risks of IT architectures, or parts of them. The QualTD Model is based on our previous quantitative model, but geared to industrial practice since it does not require quantitative data which is often too costly to acquire. We validate the model and method in a real-world case by performing a risk assessment on the authentication and authorisation system of a large multinational company and by evaluating the results w.r.t. the goals of the stakeholders of the system. We also perform a review of the most popular standard risk assessment methods and an analysis of which one can be actually integrated with our QualTD Model

    Improving Labor Inspections Systems: Design Options

    Get PDF
    [Excerpt] The following paper identifies experimental designs for the evaluation of labor inspection systems in Latin America. It includes six principal sections. Section 1 discusses the main differences between the “Latin model” (Piore and Schrank 2008) of labor inspection and the more familiar approach adopted by enforcement agencies like OSHA and the Wage and Hour Division in the US. Section 2 discusses theories of regulatory noncompliance and develops a logic model that links enforcement strategies to compliance outcomes in the region. Section 3 discusses some of the strategies that are available to Latin American labor inspectors and sets the stage for a discussion of their assignment to experimental subjects. Section 4 identifies five possible subjects of experimentation (e.g., inspectors, firms, jurisdictions) and discusses their respective receptivity to both random assignment and counterfactual analysis (e.g., data needs, estimation procedures, etc.). Section 5 addresses practical considerations involved in the design and conduct of experiments on inspection systems—including their utility, ethics, and viability—and introduces a checklist designed to facilitate their assessment. And Section 6 describes three potential experiments—labeled “professionals v. partisans,” “risk-based targeting v. randomized inspection,” and “carrots v. sticks” respectively—and discusses their principal goals and limitations in light of the checklist

    Outpatient Civil Commitment in North Carolina: Constitutional and Policy Concerns

    Get PDF
    Outpatient commitment of the mentally ill is court-ordered treatment in the community and is usually characterized by short, recurring visits to a mental health clinic that provides treatment such as medication, individual or group therapy, day or part-day activities or supervision of living arrangements. The history and design of the North Carolina preventive commitment scheme and constitutional difficulties with this statute are discussed

    The RFID PIA – developed by industry, agreed by regulators

    Get PDF
    This chapter discusses the privacy impact assessment (PIA) framework endorsed by the European Commission on February 11th, 2011. This PIA, the first to receive the Commission's endorsement, was developed to deal with privacy challenges associated with the deployment of radio frequency identification (RFID) technology, a key building block of the Internet of Things. The goal of this chapter is to present the methodology and key constructs of the RFID PIA Framework in more detail than was possible in the official text. RFID operators can use this article as a support document when they conduct PIAs and need to interpret the PIA Framework. The chapter begins with a history of why and how the PIA Framework for RFID came about. It then proceeds with a description of the endorsed PIA process for RFID applications and explains in detail how this process is supposed to function. It provides examples discussed during the development of the PIA Framework. These examples reflect the rationale behind and evolution of the text's methods and definitions. The chapter also provides insight into the stakeholder debates and compromises that have important implications for PIAs in general.Series: Working Papers on Information Systems, Information Business and Operation

    Indicators for management of coral reefs and their applications to marine protected areas

    Get PDF
    Informed planning and decision-making in the management of natural resources requires an ability to integrate complex interactions in ecosystems and communicate these effectively to stakeholders. This involves coping with three fundamental dilemmas. The first comes from the irregular pulse of nature. The second is the recognition that there are no strictly objective criteria for judging the well-being of an ecosystem. The third is posed by the quest for indicators with some integrative properties that may be used to analyze an ecosystem and impart the information to the relevant resource users. This paper presents some examples of indicators used to: 1) assess the status of a coral reef and, in particular, the state of its fisheries resources; 2) identify reefs that are most threatened by human activities; and 3) evaluate the likelihood of success of management interventions. These indicators are not exhaustive, but illustrate the range of options available for the management of coral reef ecosystems
    • …
    corecore